US 12,273,364 B2
Protecting computer assets from malicious attacks
Adam Paquin, Suwanee, GA (US); Peyton Duncan, Orlando, FL (US); Kevin Shen, Boyds, MD (US); Jonathan Bees, Pittsburgh, PA (US); and Srinivas Babu Tummalapenta, Broomfield, CO (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Dec. 12, 2023, as Appl. No. 18/536,802.
Application 18/536,802 is a continuation of application No. 17/717,882, filed on Apr. 11, 2022, granted, now 11,888,872.
Application 17/717,882 is a continuation of application No. 16/875,340, filed on May 15, 2020, granted, now 11,363,041, issued on Jun. 14, 2022.
Prior Publication US 2024/0114043 A1, Apr. 4, 2024
Int. Cl. H04L 9/40 (2022.01); G06F 40/35 (2020.01); G06N 3/04 (2023.01)
CPC H04L 63/1416 (2013.01) [G06F 40/35 (2020.01); G06N 3/04 (2013.01); H04L 63/0218 (2013.01); H04L 63/1433 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A system for protection of a computer asset comprising:
a memory storing program instructions; and
a processor in communication with the memory, the processor being configured to execute the program instructions to perform processes comprising:
a particular signature, wherein the particular signature is software that causes a particular gateway to block an intrusion from reaching a particular computer asset having a particular asset context, wherein the intrusion is identified from risk related information including a list of vulnerable network resources that are protected by the particular gateway and that are vulnerable to the intrusion;
a deep neural network (DNN) configured and trained to identify the particular gateway by inputting the particular signature and a particular asset content associated with the particular computer asset into the DNN; and
wherein, the particular signature is installed on the identified particular gateway.